Summary: SELinux is preventing /bin/bash "read" access on /home/djscott/bin. Detailed Description: [SELinux is in permissive mode. This access was not denied.] SELinux denied access requested by mysqld_safe. It is not expected that this access is required by mysqld_safe and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. Allowing Access: You can generate a local policy module to allow this access - see FAQ (http://docs.fedoraproject.org/selinux-faq-fc5/#id2961385) Please file a bug report. Additional Information: Source Context unconfined_u:system_r:mysqld_safe_t:s0 Target Context unconfined_u:object_r:home_bin_t:s0 Target Objects /home/djscott/bin [ lnk_file ] Source mysqld_safe Source Path /bin/bash Port <Unknown> Host (removed) Source RPM Packages bash-4.1.7-1.fc13 Target RPM Packages Policy RPM selinux-policy-3.7.19-21.fc13 Selinux Enabled True Policy Type targeted Enforcing Mode Permissive Plugin Name catchall Host Name (removed) Platform Linux (removed) 2.6.33.5-112.fc13.x86_64 #1 SMP Thu May 27 02:28:31 UTC 2010 x86_64 x86_64 Alert Count 3 First Seen Tue 08 Jun 2010 04:53:30 PM EDT Last Seen Tue 08 Jun 2010 04:53:34 PM EDT Local ID efb31271-db22-41de-9ae5-5b7753e4e94c Line Numbers Raw Audit Messages node=(removed) type=AVC msg=audit(1276030414.459:3159248): avc: denied { read } for pid=32223 comm="mysqld_safe" name="bin" dev=dm-0 ino=54 scontext=unconfined_u:system_r:mysqld_safe_t:s0 tcontext=unconfined_u:object_r:home_bin_t:s0 tclass=lnk_file node=(removed) type=AVC msg=audit(1276030414.459:3159248): avc: denied { write } for pid=32223 comm="mysqld_safe" lport=7001 scontext=unconfined_u:system_r:mysqld_safe_t:s0 tcontext=system_u:system_r:afs_t:s0 tclass=udp_socket node=(removed) type=SYSCALL msg=audit(1276030414.459:3159248): arch=c000003e syscall=4 success=no exit=-2 a0=ced3d0 a1=7fff77e8ef70 a2=7fff77e8ef70 a3=7fff77e8edb0 items=0 ppid=32190 pid=32223 auid=768 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts11 ses=1 comm="mysqld_safe" exe="/bin/bash" subj=unconfined_u:system_r:mysqld_safe_t:s0 key=(null) Hash String generated from catchall,mysqld_safe,mysqld_safe_t,home_bin_t,lnk_file,read audit2allow suggests: #============= mysqld_safe_t ============== allow mysqld_safe_t afs_t:udp_socket write; allow mysqld_safe_t home_bin_t:lnk_file read;
*** This bug has been marked as a duplicate of bug 601914 ***